using cloud with byod - obtaining maximum business value from both
TRANSCRIPT
-
7/31/2019 Using Cloud with BYOD - Obtaining Maximum Business Value from Both
1/2
I]EIo}nh Nqn`~}itn P~ffg{y
Io}nh I]
I] Knp} U{g`}i`np
@hc~m @cfu~}iob gom I] @cop~fn{izg}ico
J~on ;57;
Mnhitn{iob @hc~m&kgpnm Pn{ti`np io gK{iob&Yc~{&Cro Noti{cofno}
Gp Io}nh I] k~ihmp hc~m iod{gp}{~`}~{n gom nogkhnp hc~m pn{ti`np( con cd c~{ bcghp ip }c fgln
}acpn pn{ti`np gtgihgkhn }c gp k{cgm g {gobn cd mnti`np gp ucppikhn/ ]an{ndc{n( rn g{n
io}nb{g}iob c~{ hc~m cfu~}iob nddc{}p ri}a c~{ k{iob&yc~{&cro mnti`n ioi}ig}itnp( nogkhiob
Io}nh }c ck}gio }an fgqif~f k~pionpp tgh~n d{cf kc}a/
Rn agtn dc~om }ag} }an lny }c mnhitn{iob hc~m&kgpnm pn{ti np }c g rimn tg{in}y cd mnti`np(
io`h~miob KYC mnti`np( ip }c `{ng}n g }rc&rgy grg{nonpp kn}rnno }an hc~m gom }an hino}/
Oc} ghh hino} mnti`np agtn }an pgfn gugkihi}inp( gom }an hc~m ip oc} ghrgyp gtgihgkhn }c g
`hino} mnti`n/ ]an{ndc{n( g con&pizn&di}p&ghh pn{ti`n mnhitn{y fcmnh ip oc} guu{cu{ig}n/ G
fipghibofno} kn}rnno }an mnhitn{y fcmnh gom }an mnti`n c~hm onbg}itnhy gddn`} nfuhcynn
u{cm~`}iti}y gom k~pionpp d~o`}icoghi}y( io}{cm~`n pn`~{i}y {ipl( gom iotghimg}n }an iotnp}fno}
fgmn io mntnhcuiob hc~m&kgpnm pn{ti`np gom guuhi`g}icop/
@hino}&grg{n @hc~mRn g{n mntnhcuiob go io}nhhibno}( hino}&grg{n hc~m }ag} rihh kn gkhn }c mn}n{fion }an dchhcriob:
Ran}an{ go guuhi`g}ico u{ctimnp }an knp} ~pn{ nqun{ino`n id nqn`~}nm hc`ghhy c{ {nfc}nhy
Rai`a og}itn dng}~{np( p~`a gp g hc`g}ico&kgpnm pn{ti`n u{ctimnm ky }an Bhckgh Ucpi}icoiob Pyp}nf c{ g``nhn{cfn}n{( g{n
gtgihgkhn co g mnti`n
Acr }c ~pn u{nmndionm ~pn{ gom mnti`n u{cdihnp }c ~p}cfizn pn{ti`np }c ~pn{ u{ndn{no`np gom }an mnti`np pn`~{i}y g``npp
hntnh
@hc~m&grg{n @hino}
@cotn{pnhy( rn g{n ghpc np}gkhipaiob dc~omg}icogh gugkihi}inp }c nogkhn hc~m&grg{n hino} mnti`np/ Dc{ nqgfuhn( g hino} mnti`n rihh kn
gkhn }c mn}n{fion }an dchhcriob:
Ran}an{ }an `hc~m ip gtgihgkhn
Rag} pn{ti`np g{n gtgihgkhn }c }an `hino} mnti`n g} }an }ifn
I}p pn`~{i}y hntnh gom gtgihgkhn kgomrim}a
Io}nb{g}iob KYCM nddc{}p ri}a
c~{ hc~m mntnhcufno}:
Nogkhnp pn`~{n( dhnqikhn mnhitn{y cd
pn{ti`np }c g rimn tg{in}y cd
mnti`np
Noago`np ~pn{ nqun{ino`n gom
u{cm~`}iti}y
P~uuc{}p }an knp} ucppikhn
un{dc{fgo`n mnunomiob co mnti`n
`gugkihi}y gom hc~m gtgihgkihi}y
http://www.intel.com/ithttp://www.intel.com/it -
7/31/2019 Using Cloud with BYOD - Obtaining Maximum Business Value from Both
2/2
]aip ugun{ ip dc{ iodc{fg}icogh u~{ucpnp cohy/ ]AIP MC@^FNO] IP U[CTIMNM GP IP RI]A OC RG[[GO]INP RAG]PCNTN[( IO@H^MIOBGOY RG[[GO]Y CD FN[@AGO]GKIHI]Y( OCOIOD[IOBNFNO]( DI]ONPP DC[ GOY UG[]I@^HG[ U^[UCPN( C[ GOY RG[[GO]Y
C]AN[RIPN G[IPIOB C^] CD GOY U[CUCPGH( PUN@IDI@G]ICO C[ PGFUHN/ Io}nh mip`hgifp ghh higkihi}y( io`h~miob higkihi}y dc{ iod{iobnfno} cdgoy u{cu{in}g{y {iba}p( {nhg}iob }c ~pn cd iodc{fg}ico io }aip pun`idi`g}ico/ Oc hi`nopn( nqu{npp c{ ifuhinm( ky np}cuunh c{ c}an{ripn( }c goy io}nhhn`}~ghu{cun{}y {iba}p ip b{go}nm an{nio/
Io}nh( }an Io}nh hcbc( gom c}an{ Io}nh u{cm~ }p c{ }{gmnfg{lp g{n } {gmnfg{lp cd Io}nh @c{uc{g}ico io }an ^/P/ gomc}an{ `c~o}{inp/
* C}an{ ogfnp gom k{gomp fgy kn `hgifnm gp }an u{cun{}y cd c}an{p/
@cuy{iba} ;57; Io}nh @c{uc{g}ico/ Ghh {iba}p {npn{tnm/ U{io}nm io ^PG Uhngpn [n`y`hn
Dc{ nqgfuhn( id }an hc~m ip gtgihgkhn( }an mnti`n p}c{np g mc`~fno} io g hc~m&kgpnm mc`~fno} {nucpi}c{y/ K~}( id }an hc~m ipo}
gtgihgkhn( }an mnti`n p}c{np }an mc`~fno} hc`ghhy gom ucppikhy g~}cfg}i`ghhy ~uhcgmp }an mc`~fno} }c }an hc~m rano i} kn`cfnp
ucppikhn/
Dc~omg}icogh Pn{ti`np
Ifuhnfno}iob g hino}&grg{n hc~m gom `hc~m&grg{n mnti`np {nw~i{np agobnp }c pntn{gh g{ngp cd }an I] noti{cofno}:
U{ctimiob hc~m&kgpnm pn{ti`np }c f~h}iuhn mnti`np gom CPp {nw~i{np pntn{gh fcmidi`g}icop }c
c~{ cff~oi`g}icop iod{gp}{~`}~{n( p~`a gp gmmi}icogh di{nrghh co}{chp/ ]c fgogbn( u{c}n`}( gom mnhitn{ co}no} dhnqikhy( rn
agtn fgmn piboidi`go} noago`nfno}p gom gmj~p}fno}p }c c~{ iodc{fg}ico pn`~{i}y fcmnh( fckihn mnti`n fgogbnfno}
u{g`}i`np( gom un{pcogh rc{lpug`n uc{}gkihi}y gugkihi}inp/
Kn`g~pn c~{ bcgh ip }c nogkhn hc~m&kgpnm pn{ti`np }ag} }gln gmtgo}gbn cd dng}~{np co nfuhcynnp
mnti`np( rn onnm }c g`} gp g }{~p}nm gmtipc{( u{ctimiob nfuhcynnp iodc{fg}ico gkc~} g mnti`n( ran}an{ i}p g pfg{}uacon(
}gkhn}( c{ U@/ ]c nm~`g}n nfuhcynnp gkc~} rai`a mnti`np go g``npp rai a no}n{u{ipn pn{ti`np gom rai`a mnti`np gom CPp
g{n knp} dc{ n{}gio rc{l p`nog{icp( rn agtn {ng}nm g rnk uc{}gh }ag} u{ctimnp g rimn tg{in}y cd iodc{fg}ico }c nfuhcynnp
no{chhiob io c~{ KYCM u{cb{gfp/
Rn g{n ifuhnfno}iob g mg}g gom guuhi`g}ico ti{}~ghizg}ico d{gfnrc{l }ag} ghhcrp ~p }c
mn`c~uhn c~{ no}n{u{ipn guuhi`g}icop }ag} dchhcr fc{n }{gmi}icogh pcd}rg{n mntnhcufno} fn}acmchcby d{cf fgoy cd c~{
onrn{ gugkihi}inp }ag} mnfgom g dgp}n{ ug`n/ ]aip ghhcrp ~p }c {ng}n gppnfkhn&}c&c{mn{( hc~m&kgpnm pch~}icop ky
`cfkioiob }an gugkihi}inp cd nqip}iob no}n{u{ipn mg}g gom guuhi`g}icop gom io}nb{g}iob }anf ri}a onr gugkihi}inp/
]an{n g{n ug{ghhnhp gom io}n{mnunomno`inp kn}rnno I] `cop~fn{izg}ico( rai`a u{ctimnp nfuhcynnp ri}a g rimn{ {gobn cd aci`np dc{
`cfu~}n gugkihi}y( gom }an gmtno} cd hc~m cfu~}iob( rai`a cddn{p k~pionppnp gmmi}icogh cu}icop dc{ I] pn{ti`np/ Ky }gliob
gmtgo}gbn cd }an ~o iw~n p}{nob}ap gppc`ig}nm ri}a }an mnti`n gom }an hc~m( rn g{n pyp}nfg}i`ghhy k~ihmiob g u{itg}n no}n{u{ipn hc~m
}ag} go mn}n{fion mnti`n g}}{ik~}np gom ~pn{ u{ndn{no`np( gom }gihc{ pn{ti`np g``c{miobhy/
Yc~ go diom g d~hh mip`~ppico cd }aip }cui` g} Mnhitn{iob @hc~m&kgpnm Pn{ti`np io g K{iob&Yc~{&Cro Noti{cofno}/
Dc{ fc{n iodc{fg}ico co Io}nh I] knp} u{g`}i`np( tipi}rrr/io}nh/`cf#i}/
http://www.intel.com/content/www/us/en/secure/intel-it-best-practices/delivering-cloud-based-services-in-a-bring-your-own-environment.htmlhttp://www.intel.com/content/www/us/en/secure/intel-it-best-practices/delivering-cloud-based-services-in-a-bring-your-own-environment.htmlhttp://www.intel.com/ithttp://www.intel.com/ithttp://www.intel.com/ithttp://www.intel.com/ithttp://www.intel.com/content/www/us/en/secure/intel-it-best-practices/delivering-cloud-based-services-in-a-bring-your-own-environment.html